E-Span and LPT for data aggregation in wireless sensor networks

Size: px
Start display at page:

Download "E-Span and LPT for data aggregation in wireless sensor networks"

Transcription

1 Computer Communications 29 (2006) E-Span and LPT for data aggregation in wireless sensor networks Weinan Marc Lee *, Vincent W.S. Wong Department of Electrical and Computer Engineering, The University of British Columbia, 2332 Main Mall, Vancouver, BC, Canada V6T 1Z4 Available online 10 March 2006 Abstract In wireless sensor networks (WSNs), when a stimulus or event is detected within a particular region, data reports from the neighboring sensor nodes (sources) are sent to the sink (destination). Data from these sources are usually aggregated along their way to the sink. The data aggregation via in-network processing reduce communication cost and improves energy efficiency. In this paper, we propose two different tree structures to facilitate data aggregation. We first propose E-Span, which is an energy-aware spanning tree algorithm. In E-span, the source node which has the highest residual energy is chosen as the root. Other source nodes choose their corresponding parent node among their neighbors based on the information of the residual energy and distance to the root. We also propose the Lifetime-Preserving Tree (LPT). In LPT, nodes which have higher residual energy are chosen as the aggregating parents. LPT also includes a self-healing feature by which the tree will be re-constructed again whenever a node is no longer functional or a broken link is detected. By choosing Directed Diffusion [C. Intanagonwiwat, R. Govindan, D. Estrin, Directed diffusion: a scalable and robust communication paradigm for sensor networks, in: Proc. of ACM MobiCom 00, Boston, MA, Aug. 2000, pp ] as the underlying routing platform, simulation results show that in a WSN with 250 sensor nodes, the lifetime of sources can be extended significantly when data are aggregated by using either E-Span or LPT algorithms. Ó 2006 Published by Elsevier B.V. Keywords: Data aggregation; Wireless sensor networks 1. Introduction The rapid advances in wireless communication and Micro Electro Mechanical System (MEMS) have made Wireless Sensor Networks (WSNs) possible. Such environments are typically comprised of a large number of sensors being randomly deployed for detecting and monitoring tasks. These sensors, developed at a low cost and in small size (mm-scale for smart dust motes [2]), are responsible for sensing, data processing, and routing activities. Applications of such networks range from battlefield communication systems (e.g., intrusion detections, target surveillance) to environmental monitoring networks such as habitat monitoring, chemical sensing, infrastructure security, inventory, and traffic control. For example, sensors may be distributed across a forest in order to report * Corresponding author. Tel.: ; fax: addresses: wnmlee@ece.ubc.ca (W.M. Lee), vincentw@ ece.ubc.ca (V.W.S. Wong). the origin of a fire event when there is a significant increase in the average monitoring temperature. Unlike conventional ad hoc communication networks, energy resources in WSNs are usually scarce due to the cost and size constraints of sensor nodes. Conserving energy is thus the key to the design of an efficient WSN. Perhaps the most significant difference between an Internet-based system and a WSN is the collaborative efforts provided by sensors. Each node in an Internet-based system competes with other nodes for a fair share of resources in order to run tasks and applications of its own. Per-hop fairness is therefore the primary concern. WSNs, on the other hand, rely on the collective information provided by the sensors. Most sensor nodes are task specific in that they are all programmed for one common application. A node at one specific time may be granted more resources than other nodes if the program objective is still satisfied. For this reason, network resources are shared but it is not necessary that they be equally distributed as long as the application performance is not degraded /$ - see front matter Ó 2006 Published by Elsevier B.V. doi: /j.comcom

2 W.M. Lee, V.W.S. Wong / Computer Communications 29 (2006) Since sensors are densely deployed in WSNs, the detection of a particular stimulus or event can trigger the response from many nearby sensor nodes. Data in WSNs are usually not directly transmitted to the interested users upon event detection. Instead, nearby sensor nodes (sources) would aggregate the data locally to remove any redundancy. Reference [3] suggests that transmitting a data packet of size 1 Kb to a distance 100 m away is similar to executing 3 million instructions on a general-purpose computer. Thus, it is beneficial to perform data aggregation via in-network processing to reduce communication cost and improve energy efficiency. Various data aggregation algorithms have been proposed in the literature. An Energy-Aware Data Aggregation Tree (EADAT) algorithm is proposed in [4]. The base station (root) sends a broadcast control message periodically. Upon receiving this message for the first time, each node will start a timer. The expiration time is inversely proportional to the node s residual energy. The timer is refreshed when a node receives this message during the timer count down. A dynamic convoy tree-based collaboration (DCTC) framework for tracking a mobile target is proposed in [5]. Heuristics are used to predict the object s moving direction. A dynamic tree is then created by adding or pruning the sensors near the moving target. The root of the tree can dynamically refine the readings gathered from various tree nodes. Since the coverage area of individual sensor nodes usually overlaps, the work in [6] attempts to periodically search the smallest subset of nodes that covers the monitoring area. This group of nodes is referred to as the areadominating set. The authors in [6] proposed the use of a distributed spanning tree, induced by the initial interest flood over the area-dominating set, for aggregating reply messages from various event sources. The problem of convergecast (many-to-one) for data aggregation is addressed in [7]. A tree that is rooted at the base station is constructed such that the link cost from each node to the base station is minimized. Further improvement includes enhancing the likelihood of simultaneous aggregation and reducing the latency for convergecast. However, the algorithm is centralized and the knowledge of global connectivity is required. Some recent work proposed the partition of network into small adjacent grids or clusters on which data aggregation is performed. Specifically, a cluster head is associated with each cluster so that all the nodes belonging to the same cluster can aggregate their readings through this node. The work in [8] periodically selects cluster heads according to a hybrid of the residual energy and node degree, resulting in a set of energy-rich cluster heads being uniformly distributed across the network. However, their work assumes that nodes have variable transmission power to maintain a certain degree of connectivity between the clusters. In this paper, we consider a network with M randomly deployed sensors in which each node m has an identical transmission range and initial residual energy e m. An event, triggering N sensors around it, occurs at a random location in the network. Data reports from these sources are clockdriven upon event detection. We define the node lifetime to be the time that a source node runs out of its energy. We propose two different tree structures to facilitate data aggregation. We first propose E-Span, which is an energy-aware spanning tree algorithm. In E-span, the source node which has the highest residual energy is chosen as the root. Other source nodes choose their corresponding parent node among their neighbors based on the information of the residual energy and distance to the root. We also propose the Lifetime-Preserving Tree (LPT). In LPT, nodes which have higher residual energy are chosen as the aggregating parents. LPT also includes a self-healing feature by which the tree will be re-constructed again whenever a node is no longer functional or a broken link is detected. Our proposed LPT shares the same objective as [4,6,7] in an attempt to construct a data aggregation tree and select a dedicated root for which data are gathered. Both LPT and EADAT [4] select the aggregating nodes which have higher energy. In addition, LPT, EADAT [4], and HEED [8] consider the residual energy, thereby enhancing the likelihood of distributing the loads over higher-energy nodes. However, LPT differs from EADAT [4] in that extensive use of timers is not necessary. While the work in [4,6,7] requires the prior knowledge or support from a given tree root, our proposed LPT does not require the root to be any particular node. In terms of root selection, we consider the residual energy of nodes within the event area whereas [6,7] compare the link cost that associates with each of them. By choosing Directed Diffusion [1] as the underlying routing platform, simulation results show that in a WSN with 250 sensor nodes, the lifetime of sources can be extended significantly when data are aggregated by using either E-Span or LPT algorithms. The remainder of this paper is organized as follows. The network model and problem formulation are given in Section 2. In Section 3, we first present the E-Span algorithm. It is followed by the description of the centralized and distributed versions of the LPT algorithms. The performance comparisons between E-Span, LPT, and Directed Diffusion are presented in Section 4. Conclusions are given in Section Background In this section, we first present the network model under considerations, the related definitions and assumptions. We then describe the problem formation and provide an overview of the spanning tree algorithm Network model We consider a field of M randomly deployed and identical sensor nodes. A number of K(K < M) sinks, randomly

3 2508 W.M. Lee, V.W.S. Wong / Computer Communications 29 (2006) chosen among these M nodes, are requesting for data reports. A stimulus, triggering N(N < M) event sources around it, occurs at a random location in this field. We assume that these sources are interconnected to each other. In practice, an event may not trigger a set of connected source nodes. However, under such scenario, multiple independent trees will be constructed with each serving a disjoint set of event sources. Hence, for simplicity, we restrict ourselves to a set of N connected source nodes. We assume that data reports from each source are clockdriven upon event detection. Furthermore, these data are assumed to be collected at a dedicated tree root and sent to the distant sinks in a periodic manner. During data collection, nodes have the abilities to perform in-network aggregation of packets enroute to the tree root. We further assume that each node m(m 2 {1, 2,...,M}) is aware of its energy, e m. Node batteries are neither replaceable nor rechargeable. We finally assume that all nodes have an identical and fixed transmission range. We define a branch to be the route from a root node to a leaf node in a given tree. The following two terms are introduced: Branch energy the minimum energy of all the non-leaf nodes in a given tree branch. Tree energy the minimum branch energy of all the branches in a given tree. Let B y denote the set of nodes along a given tree branch with y as the leaf node, and I x be the set of nodes in a given tree rooted at node x. Mathematically, the branch and tree energies are calculated as follows: Branch energy for branch By ¼ min i2b y;i6¼y fe ig; Tree energy for tree I x ¼ min fe jg. j2i x;j6¼leafnode An example of the branch energy and tree energy calculation is given in Fig Problem formulation Given a number of N connected source nodes with each source labeled n(n 2 {1, 2,...,N}) and the knowledge of their own residual energy, e n, our goal is to find a tree spanning all these sources and an appropriate tree root for data collection so that the functional lifetime of each source is preserved as much as possible. Note that the time till the first link breaks in a given tree determines the lifetime of each source (due to the additional energy cost for the broken-link repairs), and the tree energy directly reflects this time. We hence tackle this problem by searching for a tree with the highest tree energy. In the literature, network lifetime has often been defined as either the time till the first or a set of nodes runs out of its energy [9 12], or till the first loss of connectivity or coverage [13,14], or a combination of these [15]. A formal definition of network lifetime may depend on the application ð1þ ð2þ Fig. 1. An example to describe branch and tree energies: (a) energy of the branch from nodes A to D is set to 3 J, the energy of node B. (b) Tree energy is set to 3 J, the energy of the branch from either nodes A to D or nodes A F. scenario in which the network is targeted at. However, none of these definitions deviate from interpreting network lifetime as the time before the network ceases to provide the type of service it is designed for. We therefore follow this convention, and define the branch energy as the minimum energy of all the non-leaf nodes in a given branch and define tree energy as the minimum branch energy of all the branches in a given tree. Note that the time that an upstream link along a given branch takes to break depends on the energy of the parent on such a link. In other words, the time during which data from each source along a given branch can arrive at the root depends on the minimum energy of any parent along this branch. The only remaining question is to determine how to select an appropriate tree root and the branch leading to each other source, such that the energy of this tree is maximized. In this paper, we propose two different tree structures to facilitate data aggregation. The first algorithm, called E-Span, is a variation of the spanning tree algorithm. An overview of the original spanning tree algorithm is given in the next section.

4 W.M. Lee, V.W.S. Wong / Computer Communications 29 (2006) Spanning tree algorithm A spanning tree is a graph that spans all the nodes as vertices and contains no cycles. The tree is structured in a way that the node with the smallest identifier is chosen as the root. At the same time, all other nodes are connected to this selected root via the shortest-path route. The protocol requires each node to exchange configuration messages in a format that contains the identifier of itself, that of its selected root, and the distance (in hops) to this selected root. Each node updates its configuration message upon identifying a root with a smaller identifier or the shortestpath neighbor. Furthermore, the neighbor for which the shortest-path configuration message comes from is chosen as the parent of a node whenever it is detected. A node identifier is used to break ties if necessary. The above descriptions are being translated into the Get- Span algorithm depicted in Table 1. Note that the term single-hop broadcast refers to the operation of sending a packet to all single-hop neighbors. Lines 1 and 2 restrict the message exchanges to within the event region. Line 3 starts the exchange and an additional timer for tree maintenance. Line 4 triggers an infinite loop. Lines 5 9 allow a root to periodically generate a message every T seconds and reset a node when it starts to lose its shortest-path neighbor. Lines 10 15, on the other hand, update the node itself and forward the message whenever a node identifies a root with a smaller identifier or a better shortest-path neighbor. For example, the set of sources depicted in Fig. 2(a) will create a tree of the form shown in Fig. 2(b). Unfortunately, Table 1 The distributed spanning tree protocol Define: r n to be the ID of the root selected by node n d n to be the shortest-path distance from r n to node n g n =(n,r n,d n ) to be the message sent by node n p n to be the ID of the parent selected by node n t recv,n to be the time node n received the message from its parent Initialize: g n to (n, n, 0)" n 2 N p n to n " n 2 N t recv,n to 0 " n 2 N GetSpan (node ID n, time t, timeframe T) 1 if (n! = event source) 2 return; 3 single-hop broadcast g n and start a timer P that expires every T sec; 4 while true 5 if P expires and (r n = n or t > t recv,n + T) 6 set g n to (n, n, 0); 7 set p n to n; 8 set t recv,n to t; 9 single-hop broadcast g n ; 10 if receiving a message g i from node i 11 if r i < r n or (r i = r n and d i +1<d n )or(r i = r n and d i +1=d n and i 6 p n ) 12 set g n to (n, r i, d i +1); 13 set p n to i; 14 set t recv,n to t; 15 single-hop broadcast g n and restart timer P; Fig. 2. An example of the spanning tree protocol: (a) connectivity diagram for a set of given sources. (b) The spanning tree configurations will have node 1 with energy 3 J chosen as the root, resulting in the lowest tree energy of 3 J. failure to consider the node s residual energy results in this tree having the lowest energy of 3 J. Furthermore, the node that is equipped with the minimum energy, i.e., node 1, is chosen as the root and is attached to three other child nodes. When this tree is deployed for data collection among these sources, the rate at which node 1 dissipates its energy is quite high and thus the time to the first node death is minimized. We therefore make some changes and present an energy-aware variant of this protocol, namely E-Span. 3. Proposed tree structures In this section, we describe two different tree structures to facilitate data aggregation. We first describe the E-Span algorithm [19,20]. It is followed by the description of the centralized and distributed versions of the LPT algorithm [21]. Unless stated otherwise, we will use the connectivity diagram shown in Fig. 2(a) for all the examples illustrated in this section E-Span As with the conventional spanning tree, E-Span is a graph that covers all the nodes as vertices and contains no cycles. All other nodes are still connected to the selected

5 2510 W.M. Lee, V.W.S. Wong / Computer Communications 29 (2006) root via the shortest-path route. Since the root, besides collecting data, is also responsible for coordinating the routes with distant sinks, the node with the highest energy level is now chosen as the root. Moreover, any other node is given the choice to select its parent as the highest-energy neighbor for which the shortest-path message comes from. By using the connectivity diagram in Fig. 2(a), the tree will now have node 8 chosen as the root and all other nodes are connecting to node 8 via the shortest-path route (see Fig. 3). Specifically, node 6 which finds itself having two shortest-path neighbors of nodes 2 and 4 will in fact attach itself to the higher-energy one (i.e., node 2). The reason is to allow a node that has more available resources to be selected as a parent node for data collection. The pseudo-code of the E-Span algorithm is given in Table 2. The configuration message now involves three additional parameters: the residual energy of the node that sends the message, the residual energy of the node s chosen root, and the residual energy of the node s chosen parent. As with the GetSpan algorithm, lines 1 3 start the message exchanges and restrict these exchanges to within the event area. Lines 4 7 allow a root to periodically generate a message every T seconds and reset a node that loses connection with its parent. Lines 8 12 update the list of child nodes for the receiving node. Lines update the message when a node receives an energy update from its parent, or when it detects a better shortest-path neighbor or a higher-energy root. Lines 18 and 19 compare the receiving node with the root. Lines 20 and 21 broadcast the message after a change. Again, single-hop broadcast is referred to the operation of sending a packet to all single-hop neighbors. Unfortunately, without knowing the complete set of connectivity provided by all sources, some nodes in E-Span still traverse to the root through routes with a lower branch energy. As a result, each source can more often be involved in tree re-construction, implying that a greater portion of its available energy is consumed in repairing broken tree links over the course of its lifetime. As an example (see Fig. 3), nodes 3 and 5 could have been attached to nodes 6 and 3, respectively, resulting in tree energy of 7 rather than 3 J. In addition, the energy dissipation rates for nodes Table 2 The distributed energy-aware spanning tree protocol Define: e n to be the residual energy of node n r n to be the ID of the root selected by node n e(r n ) to be the last-updated energy of the root selected by node n d n to be the shortest-path distance from r n to node n p n to be the parent selected by node n s n =(n, e n, r n, e(r n ), p n, d n ) to be the message sent by node n e(p n ) to be the last-updated energy of the parent selected by node n t recv,n to be the time node n received the message from its parent childlist n to be the list of child nodes for node n Initialize: Change (n, e n, n, e n,0,0)" n 2 N GetESpan (node ID n, node energy e n, time t, timeframe T) 1 if (n!= event source) 2 return; 3 single-hop broadcast s n and start a timer P that expires every T sec; 4 while true 5 if P expires and (r n = n or t > t recv,n + T) 6 Change (n, e n, n, e n,0,t); 7 single-hop broadcast s n ; 8 if receiving a message s i from node i 9 if (p i = n) 10 add i to childlist n ; 11 else 12 remove i from childlist n ; 13 if (r i = r n ) 14 if (i = p n )or(d i +1 < d n )or(d i +1 = d n and e i > e(p n )) or (d i +1 = d n and e i = e(p n ) and i < p n ) 15 Change (i, e i, r i, e(r i ), d i +1, t); 16 else if (e(r i )>e(r n )) or (e(r i )=e(r n ) and r i < r n ) 17 Change (i, e i, r i, e(r i ), d i +1, t); 18 if (e n > e(r n )) or (e n = e(r n ) and n < r n ) 19 Change (n, e n, n, e n,0,t); 20 if a change is applied 21 single-hop broadcast s n ; Change (node x, energy e x, node y, energy e y, distance d, time t) 1 set s n to (n, e n, y, e y, d); 2 set p n to x; 3 set e(p n )toe x ; 4 set t recv,n to t; 1 and 7 would have been lower if the above changes were made. In other words, without making these changes, the functional lifetime of the two nodes are shorter due to the additional energy cost involved in the tree re-construction. This is clearly one issue we try to resolve, if possible, when we construct the LPT. However, we believe that the chance for it to happen is rather rare for a small number of participating sources. When the number of source nodes is large, a technique that is different from E-Span is required. We shall now present our LPT construction algorithm LPT: the centralized approach Fig. 3. An example of the E-Span protocol. The E-Span configurations will have node 8 with energy 10 J chosen as the tree root, still resulting in the lowest tree energy of 3 J. In this section, we proceed to the discussion of the lifetime-preserving tree (LPT) construction using a centralized approach. We assume that complete knowledge of the event area is given, including the connectivity and residual

6 W.M. Lee, V.W.S. Wong / Computer Communications 29 (2006) energy of all the source nodes, prior to the start of the algorithm. The tree generated can later be used to validate the correctness of the corresponding tree constructed by the distributed approach. One way to obtain an LPT is to directly run an extensive search at every node and then compare various tree energies. However, this approach has the scalability problem when the number of source nodes is large. We hence tackle the issue in a different manner. Recall that the LPT requires a root (initially unknown) to collect data from each other node via routes with the highest branch energy, subject to the condition that these routes do not create loops. Moreover, the tree has an energy that directly depends on the minimum residual energy of all non-leaf nodes. If there exists a way to identify this minimum-energy node, which represents the bottleneck to the network, it will then be easy to determine what the highest tree energy will be. To illustrate the above description, consider the set of nodes in Fig. 2(a). Any source node can either be a root, parent, or leaf. By assuming that node 5 is a root, the protocol must have each other node enroute to this root through either node 7 or 3. However, the tree must have node 6 as a parent for some nodes in the network if the tree energy has to be the highest (depicted in Fig. 4(a)). If node 5 is now a parent, node 6 again has to forward data for some nodes, for example nodes 2 and 4, in the network (Fig. 4(b)). Finally, if node 5 is a leaf, the protocol must use node 3 to forward its data to some root via either node 1 or 6. By using the same argument, node 6 again has to be a parent for data collection from node 3 (shown in Fig. 4(c)). We therefore consider node 6 to be the bottleneck node for this particular network topology, and the tree must have energy less than that of this node. We now address the question of how to identify this bottleneck node and coordinate the given set of network connection such that a tree is obtained with this node being configured as the minimum-energy non-leaf node. We begin by arranging nodes in ascending energy levels. Starting from the least-energy node, we test if the removal of all network links to this node except that from its highest-energy neighbor will disconnect the existing graph. If so, the bottleneck node is found and there are no better ways than to collect data via this node. The removed links are thus restored, and any tree rooted at one of the nodes in the remaining set shall have the energy as that of this chosen node. If not, the removed links do not contribute to the construction of the lifetime-preserving tree and we shall move on to the next node. Note that the energy of the highest-energy neighbor has to be greater than that of the node under the test. When such neighbor does not exist, the node has to be a parent for at least one of its neighbor, and thus all the links are preserved. In the case when there are more than one neighbors that have equal highest energy, either one can serve as the parent for collecting data from the node under the test without affecting the tree energy. Node ID is thus used to break this tie. Finally, for the last node, Fig. 4. An example of bottleneck node. (a) If node 5 is a root, node 6 has to collect data from nodes 2 and 4. (b) If node 5 is a parent, node 6 again has to forward data for both nodes 2 and 4. (c) If node 5 is now a leaf, node 6 has to collect data from node 3. Therefore, the tree energy cannot be greater than the energy of this bottleneck node. i.e., the highest-energy one, we conclude that there is no bottleneck node for this particular topology and any tree rooted at this last node, on the existing graph, can have the highest tree energy. To illustrate the descriptions, consider two examples. Fig. 5 depicts the centralized LPT search during which a bottleneck is found when the link from nodes 6 to 2 is removed. In other words, node 6 has to be a parent for some nodes in the network. Any tree rooted at one of the nodes in the remaining set, i.e., nodes 2, 3, 5, 6, or 8, will therefore have the highest tree energy as that of this bottleneck node. Fig. 6 depicts another example of the centralized search where no bottleneck node is found. The reason is that those links that are removed do not contribute to the formation of any lifetime-preserving tree and therefore any tree rooted at the highest-energy node, i.e., node 2, will have the highest tree energy.

7 2512 W.M. Lee, V.W.S. Wong / Computer Communications 29 (2006) The pseudo-code of the centralized version of the LPT algorithm is given in Table 3. Line 1 sorts all nodes in ascending energy levels. Lines 2 and 3 compute the highest-energy neighbor for the node under the test. Recall that the energy of this neighbor has to be greater than that of the node. When such a neighbor exists, lines 4 and 5 remove and temporarily store all links to the node except that from the highest-energy neighbor. Lines 6 10 restore the removed links, clear the storage, and compute a tree by running Dijkstra s algorithm [16] at one of the nodes in the remaining set when a bottleneck is found. Tree energy is set to the energy of the bottleneck node at this time. In fact, the reason to run the Dijkstra s algorithm is to ensure that the remaining set of network connections does create a tree and contain no loops. Lines compute a tree again by running Dijkstra s algorithm at the highest-energy node, and search the tree energy by using Eq. (2) when no bottleneck node exists in the network LPT: the distributed approach Given a number of N source nodes with each node labeled n(n 2 {1, 2,...,N}) and the knowledge of their own residual energy, e n, our goal is to construct a tree spanning all these sources and to select an appropriate root for data collection, in a distributed way, such that the energy of the tree is maximized. We take the approach of exploring the highest-energy branch from each source to a root, by first assuming that every source node is a root, using a method similar to Reverse-Path Forwarding (RPF) [17]. This generates a total of N unique trees with each being rooted at a distinct source node. We continue by comparing the energy of these trees and only employ the one with the highest tree energy for data collection. Fig. 5. An example of the centralized LPT search. Starting from the leastenergy node, we test if the removal of all the links to this node except that from its highest-energy neighbor will disconnect the existing graph. For this topology, node 6 is hence found as the bottleneck. Any tree rooted at nodes 2, 3, 5, 6, or 8, on the existing graph will have the highest tree energy of 7 J Exploring the highest-energy branch from every source to any root As previously mentioned, the time during which data from each source along a given branch can actively be received by the root depends on the minimum energy of any parent along this branch. In order to maximize this time for any pair of root and source, the connectivity between them will first have to be explored prior to obtaining the highest-energy branch connecting these two nodes. Let P x,y denote the set of possible routes, with each labeled p, from nodes x to y and bre i,j,k be the energy of a branch k with node i as the leaf and node j as the root. Note that k 2 P i,j. We determine a branch b for every pair of source s and root r such that bre s;r;b P bre s;r;p 8 p 2 P s;r ; p 6¼ b. ð3þ We use RPF which requires each source s to initiate a configuration message in a format that contains its energy information. When a source receives this message, it appends its energy information and broadcasts the message only if it has not seen this message or if it has previously forwarded the message containing lower branch energy.

8 W.M. Lee, V.W.S. Wong / Computer Communications 29 (2006) Table 3 The centralized LPT algorithm Define: node n to be the node with nth least energy e(node n ) to be the energy of node n node n,max to be the highest-energy neighbor of node n, subject to the condition that e(node n,max )>e(node n ) link x,y to be the bi-directional link, if it exists, between nodes x and y treee n to be the energy of a tree rooted at node n I to be a set, initially empty CentralizedLPT (connectivity and energy matrices) 1 sort nodes in ascending energy level; 2 for (n = 1toN, n++) 3 get node n,max ; 4 if node n,max exists 5 remove link n,i and store i in I " i 2 N, i node n,max, i n; 6 if the graph is not connected 7 restore link n,j " j 2 I and clear I; 8 set node k to be the root and run Dijkstra s algorithm on node k, where k is any one number from n to N; 9 set treee k to be e(node n ); 10 return; 11 set node N to be the root and run Dijkstra s algorithm on node N ; 12 compute treee N using Equation (2) for the tree rooted at node N ; Fig. 6. An example of the centralized LPT search. Since removal of the links, except that from the highest-energy neighbor, to the source under any test does not disconnect the existing graph, there is no bottleneck for this particular network topology. Hence, any tree rooted at node 2 will be the lifetime-preserving tree. Otherwise, it simply discards the received packet. Eventually, various copies of the initiated message will traverse through various different routes p and only the better ones will arrive at the root r. We define eid n to be the pair of energy level and ID of a node labeled n and brlist i,j,kto be a list containing the eid for the message initiating node i up to the last receiving node j via a route k with branch energy bre i,j,k. Note that bre i,j,k can be calculated by using Eq. (1). Therefore, brlist i,j,k shall have the format of a list as follows: brlist i;j;k : eid i! eid x!...! eid y! eid j ; ð4þ where nodes x and y are the intermediate receiving nodes for the message initiated by node j. Note that when node j receives the list brlist i,y,p from node y via some route p, itis as if node j is a root and node i is a leaf for the branch between nodes j and i. Our descriptions can thus be translated into the ExploreBranch function shown in Table 4. Again, single-hop broadcast refers to the operation of sending a packet to all single-hop neighbors. Line 1 allows each source to initiate its control message. Lines 2 5 update, store, and broadcast the message when the receiving node does not recognize the initiating source. Lines 6 9 reset its stored list in addition to the above three actions whenever the receiving node detects a higher-energy branch. To illustrate the ExploreBranch function, consider the set of sources shown in Fig. 7. For simplicity, we will concentrate on the control message exchanges between a source of node 5 and a root of node 8. First, the function requires node 5 to initiate a control message containing its eid. There are six possible routes the message could have possibly traveled (depicted in Figs. 7(a) (f)). Among these routes, only nodes 7 and 1 will drop the messages with the routes through nodes 1 and 3, and node 7, respectively,

9 2514 W.M. Lee, V.W.S. Wong / Computer Communications 29 (2006) Table 4 The ExploreBranch function ExploreBranch (node ID n, node energy e n ) 1 create brlist n,n, by appending eid n and single-hop broadcast brlist n,n, ; 2 while receiving brlist i,j,k from node j (k 2 P i,j, i 2 N, i n) 3 if n has not seen the message initiating node i 4 append eid n to the head of brlist i,j,k and update bre i,n,p (p 2 P i,n ); 5 store and single-hop broadcast brlist i,n,p ; 6 else if min {e n, bre i,j,k } > the stored bre i,n,q (q 2 P i,n ) 7 remove the stored brlist i,n,q and bre i,n,q ; 8 append eid n to the head of brlist i,j,k and update bre i,n,p (p 2 P i,n ); 9 store and single-hop broadcast brlist i,n,p ; subject to the condition that they have previously forwarded the messages, containing lower branch energy, initiated by node 5. The reason to drop these messages is to limit the number of control message exchanges and ensure that only the better routes will traverse through the nodes. Node 8, upon receiving the other 4 routes, will be able to identify that the route from node 5 through nodes 2, 6, and 3 indeed has the highest branch energy of 7 J Constructing a tree spanning all event nodes for every source We now proceed to construct N trees with each tree rooted at a distant source by incrementally attaching any Fig. 7. An example of the ExploreBranch function. There are 6 possible choices in which only the route in (d) will have the highest branch energy of 7 J. The messages traveling on the last two routes are dropped since they do not carry higher branch energy, subject to the condition that nodes 1 and 7 have previously forwarded a similar message.

10 W.M. Lee, V.W.S. Wong / Computer Communications 29 (2006) branch explored in the last section. Each source has an initial tree structure that only comprises the node itself. In order to construct a tree for each source that spans all event nodes, each source has to incrementally update its existing tree structure upon receiving any branch with an unknown initiating node. Note that the energy of the received branch directly determines the energy of the updated tree. To ensure that each tree carries the highest energy, the tree is also updated whenever the receiving node identifies a message with higher branch energy. We define the term, initiator, to be the source which initiates the message, and tree n to be the tree created by node n. In other words, tree n stores the incoming branches received by node n. Also let J j denote the set of initiators in tree j and treee k be the energy of tree k. treee k can be calculated by using the following equation: treee k ¼ minfbre j;k;p g; where p 2 P j;k. ð5þ j2j k Our description can be translated into the NoLoop function shown in Table 5. This function takes the received branch as an input and tests whether attaching it to the tree will not create a loop. Line 1 removes the message initiator i so that the branch only contains a list of parents. Line 2 ensures the already-attached branch for node k stored in tree n matches the route through which the received branch travels. Note that the function always accepts a branch of a size less than 3 since a loop can only be created by adding a branch of a size greater than 2 to its existing tree Constructing a tree spanning all event nodes for every source Since each source n carries its unique tree structure stored in tree n, the protocol requires every source to broadcast its tree and select the one with the highest tree energy for data aggregation among these nodes. Our objective is to create a tree rooted at node r such that: treee r P treee n 8n 2 N; n 6¼ r ð6þ Note that treee r and treee n can both be calculated using Eq. (5). In fact, there can be multiple different trees that yield the same tree energy. To break such ties, a number of other properties can be compared (e.g., tree depth, root energy, root ID, and node degree). Tree depth can be used to minimize the data latency. Root energy can be used to maximize the available resource of the root for possible tasks such as route coordination to distant sinks. Node degree can be used to minimize the power dissipation rate. Table 5 The NoLoop function NoLoop (node ID n, branch brlist i,j,k ) 1 remove eid i from brlist i,j,k to get a new brlist l,j,p, where l is the node at the tail of brlist l,j,p and p 2 P l,j ; 2 if number of eids in brlist l,j,p < 2 or (brlist l,j,p i eid n )=brlist l,n,p (stored at tree n ) 3 return true; 4 return false; In this work, we limit ourselves to use tree depth, root energy, and then root ID to break ties whenever necessary. Further work is required to evaluate the performance of the best tree selection by using other parameters. To illustrate the descriptions, consider Fig. 8. By having each participating node broadcast its selection, there will be 8 trees under the comparison. Among them, only the ones constructed by nodes 2, 3, 5, 6, and 8 comprise the highest tree energy of 7 J. We therefore wish to select the tree created by node 3 as our lifetime-preserving tree and node 3 as our root since this tree has a lower tree depth than that by nodes 5 and 8, and a higher root energy than that by nodes 2 and 6. We define lpt i to be the lifetime-preserving tree that a node i currently selects and lpte i be the energy of lpt i. Note that lpt n initially equals to tree n for all sources n. The SearchLPT function shown in Table 6 describes the procedures to search a lifetime-preserving tree for each source. Line 1 allows the source to broadcast its initial selection. While a message is received from its neighboring node with tree information (line 2), lines 3 5 update the selection of the receiving node if the received tree is better. Line 6 rebroadcasts the selection after the update. Note that we have explicitly assumed that each node has already created a tree spanning all event sources (i.e., each tree has N rows) before the function starts. Hence, the first two lines of the BetterTree function are always skipped. In practice, the number of event sources is not known a priori and each node will simply run a new SearchLPT function whenever it detects a new initiator. To ensure that only the selections with N number of rows in them are compared, we include the first two lines of the BetterTree function in order to filter out all outdated trees. 4. Performance evaluation In this section, we present the performance comparisons between E-Span [20], LPT [21], and the Directed Diffusion [1] Simulation model We implemented our tree construction modules on top of Directed Diffusion [1] in the ns-2 network simulator [18]. A square field with each side measuring L meters is considered. A number of M identical nodes, ranging from 50 to 250 in increment of 50, are randomly deployed in this field such that the average node density is kept at k = 50/ nodes/m 2. Also, 5 sinks and N sources are randomly chosen among the nodes, subject to the conditions that N = 0.1 M and sources be interconnected to each other (to model a single stimulus). The radio range is 40 m. To model an event-driven data network, each source generates random data reports of a size fixed at 136 bytes in constant intervals 1 of packet/s. An application that computes the average of reports generated by various sources is used to model the aggregation behavior.

11 2516 W.M. Lee, V.W.S. Wong / Computer Communications 29 (2006) Fig. 8. The set of trees created by the sources in the event region. Only the one with the highest tree energy is used for data aggregation among these nodes. By using the SearchLPT function, all the sources will select the tree created and rooted at node 3 for aggregation. To reasonably limit the simulation time, we altered the ns-2 energy model such that the sources carry an initial energy that is randomly chosen between 10 and 15 J. All other nodes (i.e., pure relaying nodes) are given with much higher initial energy so that the performance of the lifetime of the sources can be studied.

12 W.M. Lee, V.W.S. Wong / Computer Communications 29 (2006) Table 6 The SearchLPT Function SearchLPT (node ID n) 1 single-hop broadcast lpt n ; 2 while receiving lpt i from node i (i n) 3 if BetterTree (lpt i ) 4 delete lpt n and copy lpt i to lpt n ; 5 calculate lpte n by using Equation (5); 6 single-hop broadcast lpt n ; BetterTree (lpt lpt x ) 1 if # rows in lpt x > # rows in lpt n 2 return true; 3 if (# rows in lpt x = # rows in lpt n ) and (lpte x > lpte n ) 4 return true; 5 if (# rows in lpt x = # rows in lpt n ) and (lpte x = lpte n ) and (tree depth of lpt x < tree depth of lpt n ) 6 return true; 7 if (# rows in lpt x = # rows in lpt n ) and (lpte x = lpte n ) and (tree depth of lpt x = tree depth of lpt n ), and (e x > e n ) 8 return true; 9 if (# rows in lpt x = # rows in lpt n ) and (lpte x = lpte n ) and (tree depth of lpt x = tree depth of lpt n ), and (e x = e n ) and (x < n) 10 return true; 11 return false; Fig. 9. Percentage difference on tree energy between distributed and centralized LPTs. Idle time power, receive power, and transmit power dissipation are set at 35, 395, and 660 mw, respectively. We assume that the data processing and aggregation cost are negligible Tree energy: distributed LPT vs. centralized LPT Fig. 9 shows the percentage difference between the tree energy obtained by distributed and centralized LPT algorithms. The x-axis is the total number of sensor nodes M. Since we assume that the number of sources N is always equal to 0.1 M, an increase M also increases N. Results show that the difference is less than 5%. There is a slight increase in the percentage difference when N increases. This is due to the fact that the distributed LPT algorithm sends broadcast messages during the tree construction phase. When packet loss occurs occasionally, the distributed tree may not be the same as the centralized one Dissipated energy To study the impact of aggregation on energy reduction, we measure the average dissipated energy, which is defined as the average amount of energy consumed by a relaying sensor node throughout the entire simulation. The results are averaged over 20 different runs with a 95% confidence interval. Results in Fig. 10 show a considerable amount of energy reduction by using either LPT or E-Span when compared with Directed Diffusion. Such energy reduction is expected since both LPT and E-Span efficiently aggregate the data by combining several readings from various sources into a single summarized message. Fig. 10. Average dissipation energy as a function of network size Node lifetime In order to study the impact of LPT and E-Span on lifetime improvement, we measure the node lifetime of each source as a function of network size for LPT, E-Span, and Directed Diffusion, respectively. The average node lifetime measures the time at which a source runs out of its available energy. Each node is assigned with an initial energy that is randomly chosen between 10 and 15 J so as to limit the total simulation time at a controllable range. Figs show the results when M = 50, 100, 150, 200, and 250 nodes, respectively. We make the following observations: (1) Both LPT and E-Span considerably extend the node lifetime of each source, especially when the network is large. (2) Both LPT and E-Span have similar performance when M is small. The impact of data aggregation is again validated in (1) above. By combining reports from various sources, both LPT and E-Span suppress a considerable amount of traffic in the network. Since less energy is being consumed, there

13 2518 W.M. Lee, V.W.S. Wong / Computer Communications 29 (2006) Fig. 11. Average node lifetime for each source with M = 50 nodes. Fig. 14. Average node lifetime for each source with M = 200 nodes. Fig. 15. Average node lifetime for each source with M = 250 nodes. Fig. 12. Average node lifetime for each source with M = 100 nodes. tree with the highest-energy node selected as the root and all other nodes as leaf nodes. When this happens, the lifetime improvement will be similar. LPT has a better performance than E-Span when there are more sources within the event region. Note that we choose a low initial residual energy and a small simulation time (less than 400 s) in order to reduce the actual time to run all the simulations. Results reported Fig. 13. Average node lifetime for each source with M = 150 nodes. is a noticeable lifetime improvement when data are collected via the trees. For (2), we argue that the chance of obtaining an identical tree by using LPT and E-Span, respectively, is relatively high when there are fewer sources. In fact, when all the nodes are within the radio range of each other, both LPT and E-Span will create an identical Fig. 16. Average data packet delay between a source and sink.

14 W.M. Lee, V.W.S. Wong / Computer Communications 29 (2006) Fig. 17. Average packet delivery ratio between transmitting a data packet from each source and receiving it at each sink. in this section can be extrapolated to the scenarios where the sensor nodes initial residual energy is much higher Average data packet transfer delay The next experiment compares the average data packet delay between each source and sink for Directed Diffusion (Diff), LPT, and E-Span. Results in Fig. 16 show that both LPT and E-Span incur a lower delay than the Directed Diffusion. Since LPT and E-Span combine data from various sources, it is as if only a single source is generating packets. This is also true in a network with a large number of data sources Average data packet delivery ratio The last experiment measures the average packet delivery ratio for Directed Diffusion (Diff), E-Span, and LPT. Fig. 17 shows that the Directed Diffusion experiences severe congestion when the number of sources N increases. However, both LPT and E-Span are able to maintain their packet delivery ratios even when N increases. The Directed Diffusion has its network overloaded with data traffic when more sources are sending packets. A considerable amount of data packets is therefore being dropped. LPT and E-Span, on the other hand, inject data to the sensor network as if there is only a single source. Thus, they are able to steadily maintain the packet delivery ratio even when the network is large. 5. Conclusions In this paper, we proposed two overlay structures in which the sources within the event region form a tree to facilitate data aggregation. We first proposed E-Span, which is an energy-aware spanning tree algorithm. E-Span is a distributed protocol and facilitates the sources within an event region to perform data aggregation. In E-span, the source node which has the highest residual energy is chosen as the root. Each other node chooses its parent node among its neighbors based on the information of the residual energy and distance to the root. We also propose the Lifetime-Preserving Tree (LPT). Both the centralized and distributed LPT algorithms are described. Simulation results show that the trees created by both centralized and distributed LPT algorithms have similar tree energy. The average node lifetime for sensors using LPT are higher than that of the Directed Diffusion and E-Span. LPT also maintains a low average packet transfer delay and a high packet delivery ratio. Further work includes performance comparison between LPT with other data aggregation algorithms. Acknowledgment This work is supported by the Natural Sciences and Engineering Research Council of Canada under Grant No References [1] C. Intanagonwiwat, R. Govindan, D. Estrin, Directed diffusion: a scalable and robust communication paradigm for sensor networks, in: Proc. of ACM MobiCom 00, Boston, MA, Aug. 2000, pp [2] J.M. Kahn, R.H. Katz, K.S.J. Pister, Next century challenges: mobile networking for smart dust, in: Proc. of ACM MobiCom 99, Seattle, WA, Aug. 1999, pp [3] G.J. Pottie, W.J. Kaiser, Wireless integrated network sensors, Commun. ACM 43 (5) (2000) [4] M. Ding, X. Cheng, G. Xue, Aggregation tree construction in sensor networks, in: Proc. of IEEE VTC 03, Orlando, FL, Oct. 2003, pp [5] W. Zhang, G. Cao, DCTC: dynamic convoy tree-based collaboration for target tracking in sensor networks, IEEE Trans. Wireless Commun. 3 (5) (2004) [6] J. Carle, D. Simplot-Ryl, Energy-efficient area monitoring for sensor networks, IEEE Comput. Mag. 37 (2) (2004)

15 2520 W.M. Lee, V.W.S. Wong / Computer Communications 29 (2006) [7] S. Upadhyayula, V. Annamalai, S.K.S. Gupta, A low-latency and energy-efficient algorithm for convergecast, in: Proc. of IEEE GLOBECOM 03, San Francisco, CA, Dec. 2003, pp [8] O. Younis, S. Fahmy, HEED: a hybrid, energy-efficient, distributed clustering approach for ad hoc sensor networks, IEEE Trans. Mobile Comput. 3 (4) (2004) [9] E.J. Duarte-Melo, M. Liu, A. Misra, A modeling framework for computing lifetime and information capacity in wireless sensor networks, in: Proc. of 2nd WiOpt: Modeling and Optimization in Mobile, Ad Hoc and Wireless Networks, Cambridge, UK, Mar [10] K. Dasgupta, K. Kalpakis, P. Namjoshi, An efficient clustering-based heuristic for data gathering and aggregation in sensor networks, in: Proc. of IEEE WCNC 03, New Orleans, LA, Mar. 2003, pp [11] A. Sankar, Z. Liu, Maximum lifetime routing in wireless ad hoc networks, in: Proc. of IEEE Infocom 04, Hong Kong, Mar [12] E.J. Duarte-Melo, M. Liu, Analysis of energy consumption and lifetime of heterogeneous wireless sensor networks, in: Proc. of IEEE GLOBECOM 02, Taipei, Taiwan, Nov. 2002, pp [13] V. Mhatre, C. Rosenberg, D. Kofman, R. Mazumdar, N. Shroff, A minimum cost heterogeneous sensor network with a lifetime constraint, IEEE Trans. Mobile Comput. 4 (1) (2005) [14] H. Zhang, J. Hou, On deriving the upper bound of a-lifetime for large sensor networks, in: Proc. of ACM MobiHoc 04, Tokyo, Japan, May 2004, pp [15] D.M. Blough, P. Santi, Investigating upper bounds on network lifetime extension for cell-based energy conservation techniques in stationary ad hoc networks, in: Proc. of ACM MobiCom 02, Atlanta, GA, Sept. 2002, pp [16] T.H. Cormen, C.E. Leiserson, R.L. Rivest, C. Stein, Introduction to Algorithms, second ed., MIT Press, Cambridge, [17] Y.K. Dalal, R.M. Metcalfe, Reverse-path forwarding of broadcast packets, Commun. ACM 21 (12) (1978) [18] VINT. (2001, Nov.) The network simulator ns-2. [Online]. Available: < [19] M. Lee, The construction of a lifetime-preserving tree for data aggregation in wireless sensor networks, M.A.Sc. Thesis, The University of British Columbia, Vancouver, Canada, Nov (Available: < [20] M. Lee, V.W.S. Wong, An energy-efficient spanning tree algorithm for data aggregation in wireless sensor networks, in: Proc. of IEEE Pacific Rim Conference on Communications, Computers and Signal Processing (PacRim), Victoria, BC, Aug [21] M. Lee, V.W.S. Wong, LPT for data aggregation in wireless sensor networks, in: Proc. of IEEE Globecom 05, St. Louis, Missouri, Nov./ Dec Weinan Marc Lee received the B.A.Sc. and M.A.Sc. degrees, both in electrical engineering, from the University of British Columbia, Vancouver, Canada, in 2002 and 2005, respectively. His research interests include wireless communications, wireless sensor networks, and passive RFID technologies. Vincent W.S. Wong received the B.Sc. degree from the University of Manitoba in 1994, the M.A.Sc. degree from the University of Waterloo in 1996, and the Ph.D. degree from the University of British Columbia (UBC) in He worked as a systems engineer at PMC-Sierra Inc from 2000 to He is currently an assistant professor in the Department of Electrical and Computer Engineering at UBC. His current research interests are in wireless sensor networks, wireless mesh networks, and heterogeneous wireless networks. Dr. Wong received the Natural Sciences and Engineering Research Council postgraduate scholarship and the Fessenden Postgraduate Scholarship from Communications Research Centre, Industry Canada, during his graduate studies. He serves as TPC member in various conferences, including the IEEE Globecom 06 and ICC 06.

THE CONSTRUCTION OF A LIFETIME-PRESERVING TREE FOR DATA AGGREGATION IN WIRELESS SENSOR NETWORKS

THE CONSTRUCTION OF A LIFETIME-PRESERVING TREE FOR DATA AGGREGATION IN WIRELESS SENSOR NETWORKS THE CONSTRUCTION OF A LIFETIME-PRESERVING TREE FOR DATA AGGREGATION IN WIRELESS SENSOR NETWORKS by Wei Nan Marc Lee B.A.Sc. The University of British Columbia, 2002 A THESIS SUBMITTED IN PARTIAL FULFILLMENT

More information

Information Brokerage

Information Brokerage Information Brokerage Sensing Networking Leonidas Guibas Stanford University Computation CS321 Information Brokerage Services in Dynamic Environments Information Brokerage Information providers (sources,

More information

ROUTING ALGORITHMS Part 1: Data centric and hierarchical protocols

ROUTING ALGORITHMS Part 1: Data centric and hierarchical protocols ROUTING ALGORITHMS Part 1: Data centric and hierarchical protocols 1 Why can t we use conventional routing algorithms here?? A sensor node does not have an identity (address) Content based and data centric

More information

A Simple Sink Mobility Support Algorithm for Routing Protocols in Wireless Sensor Networks

A Simple Sink Mobility Support Algorithm for Routing Protocols in Wireless Sensor Networks A Simple Mobility Support Algorithm for Routing Protocols in Wireless Sensor Networks Chun-Su Park, You-Sun Kim, Kwang-Wook Lee, Seung-Kyun Kim, and Sung-Jea Ko Department of Electronics Engineering, Korea

More information

Fault Tolerant, Energy Saving Method for Reliable Information Propagation in Sensor Network

Fault Tolerant, Energy Saving Method for Reliable Information Propagation in Sensor Network Fault Tolerant, Energy Saving Method for Reliable Information Propagation in Sensor Network P.S Patheja, Akhilesh Waoo & Parul Shrivastava Dept.of Computer Science and Engineering, B.I.S.T, Anand Nagar,

More information

A More Realistic Energy Dissipation Model for Sensor Nodes

A More Realistic Energy Dissipation Model for Sensor Nodes A More Realistic Energy Dissipation Model for Sensor Nodes Raquel A.F. Mini 2, Antonio A.F. Loureiro, Badri Nath 3 Department of Computer Science Federal University of Minas Gerais Belo Horizonte, MG,

More information

Data gathering using mobile agents for reducing traffic in dense mobile wireless sensor networks

Data gathering using mobile agents for reducing traffic in dense mobile wireless sensor networks Mobile Information Systems 9 (23) 295 34 295 DOI.3233/MIS-364 IOS Press Data gathering using mobile agents for reducing traffic in dense mobile wireless sensor networks Keisuke Goto, Yuya Sasaki, Takahiro

More information

Evaluation of Cartesian-based Routing Metrics for Wireless Sensor Networks

Evaluation of Cartesian-based Routing Metrics for Wireless Sensor Networks Evaluation of Cartesian-based Routing Metrics for Wireless Sensor Networks Ayad Salhieh Department of Electrical and Computer Engineering Wayne State University Detroit, MI 48202 ai4874@wayne.edu Loren

More information

Prianka.P 1, Thenral 2

Prianka.P 1, Thenral 2 An Efficient Routing Protocol design and Optimizing Sensor Coverage Area in Wireless Sensor Networks Prianka.P 1, Thenral 2 Department of Electronics Communication and Engineering, Ganadipathy Tulsi s

More information

Routing Protocols in MANETs

Routing Protocols in MANETs Chapter 4 Routing Protocols in MANETs 4.1 Introduction The main aim of any Ad Hoc network routing protocol is to meet the challenges of the dynamically changing topology and establish a correct and an

More information

CHAPTER 5 ANT-FUZZY META HEURISTIC GENETIC SENSOR NETWORK SYSTEM FOR MULTI - SINK AGGREGATED DATA TRANSMISSION

CHAPTER 5 ANT-FUZZY META HEURISTIC GENETIC SENSOR NETWORK SYSTEM FOR MULTI - SINK AGGREGATED DATA TRANSMISSION CHAPTER 5 ANT-FUZZY META HEURISTIC GENETIC SENSOR NETWORK SYSTEM FOR MULTI - SINK AGGREGATED DATA TRANSMISSION 5.1 INTRODUCTION Generally, deployment of Wireless Sensor Network (WSN) is based on a many

More information

Reliable Time Synchronization Protocol for Wireless Sensor Networks

Reliable Time Synchronization Protocol for Wireless Sensor Networks Reliable Time Synchronization Protocol for Wireless Sensor Networks Soyoung Hwang and Yunju Baek Department of Computer Science and Engineering Pusan National University, Busan 69-735, South Korea {youngox,yunju}@pnu.edu

More information

An Efficient Data-Centric Routing Approach for Wireless Sensor Networks using Edrina

An Efficient Data-Centric Routing Approach for Wireless Sensor Networks using Edrina An Efficient Data-Centric Routing Approach for Wireless Sensor Networks using Edrina Rajasekaran 1, Rashmi 2 1 Asst. Professor, Department of Electronics and Communication, St. Joseph College of Engineering,

More information

3. Evaluation of Selected Tree and Mesh based Routing Protocols

3. Evaluation of Selected Tree and Mesh based Routing Protocols 33 3. Evaluation of Selected Tree and Mesh based Routing Protocols 3.1 Introduction Construction of best possible multicast trees and maintaining the group connections in sequence is challenging even in

More information

ViTAMin: A Virtual Backbone Tree Algorithm for Minimal Energy Consumption in Wireless Sensor Network Routing

ViTAMin: A Virtual Backbone Tree Algorithm for Minimal Energy Consumption in Wireless Sensor Network Routing ViTAMin: A Virtual Backbone Tree Algorithm for Minimal Energy Consumption in Wireless Sensor Network Routing Jaekwang Kim Department of Electrical and Computer Engineering, Sungkyunkwan University, Suwon,

More information

Mote Design Supported with Remote Hardware Modifications Capability for Wireless Sensor Network applications

Mote Design Supported with Remote Hardware Modifications Capability for Wireless Sensor Network applications Mote Design Supported with Remote Hardware Modifications Capability for Wireless Sensor Network applications ABSTRACT Ali El Kateeb University of Michigan-Dearborn Email: elkateeb@umich.edu Many Wireless

More information

Aggregation Tree Construction in Sensor Networks

Aggregation Tree Construction in Sensor Networks Aggregation Tree Construction in Sensor Networks Min Ding Xiuzhen Cheng Guoliang Xue Abstract Large-scale wireless sensor networks are expected to play an increasingly important role in future civilian

More information

Mobile Agent Driven Time Synchronized Energy Efficient WSN

Mobile Agent Driven Time Synchronized Energy Efficient WSN Mobile Agent Driven Time Synchronized Energy Efficient WSN Sharanu 1, Padmapriya Patil 2 1 M.Tech, Department of Electronics and Communication Engineering, Poojya Doddappa Appa College of Engineering,

More information

The Impact of Clustering on the Average Path Length in Wireless Sensor Networks

The Impact of Clustering on the Average Path Length in Wireless Sensor Networks The Impact of Clustering on the Average Path Length in Wireless Sensor Networks Azrina Abd Aziz Y. Ahmet Şekercioğlu Department of Electrical and Computer Systems Engineering, Monash University, Australia

More information

Nodes Energy Conserving Algorithms to prevent Partitioning in Wireless Sensor Networks

Nodes Energy Conserving Algorithms to prevent Partitioning in Wireless Sensor Networks IJCSNS International Journal of Computer Science and Network Security, VOL.17 No.9, September 2017 139 Nodes Energy Conserving Algorithms to prevent Partitioning in Wireless Sensor Networks MINA MAHDAVI

More information

BIPAR: BImodal Power-Aware Routing Protocol For Wireless Sensor Networks

BIPAR: BImodal Power-Aware Routing Protocol For Wireless Sensor Networks BIPAR: BImodal Power-Aware Routing Protocol For Wireless Sensor Networks Abstract HANY MORCOS IBRAHIM MATTA AZER BESTAVROS {hmorcos, matta, best}@cs.bu.edu Computer Science Department, Boston University

More information

Token Ring VLANs and Related Protocols

Token Ring VLANs and Related Protocols Token Ring VLANs and Related Protocols CHAPTER 4 Token Ring VLANs A VLAN is a logical group of LAN segments, independent of physical location, with a common set of requirements. For example, several end

More information

CHAPTER 2 WIRELESS SENSOR NETWORKS AND NEED OF TOPOLOGY CONTROL

CHAPTER 2 WIRELESS SENSOR NETWORKS AND NEED OF TOPOLOGY CONTROL WIRELESS SENSOR NETWORKS AND NEED OF TOPOLOGY CONTROL 2.1 Topology Control in Wireless Sensor Networks Network topology control is about management of network topology to support network-wide requirement.

More information

ROUTING ALGORITHMS Part 2: Data centric and hierarchical protocols

ROUTING ALGORITHMS Part 2: Data centric and hierarchical protocols ROUTING ALGORITHMS Part 2: Data centric and hierarchical protocols 1 Negative Reinforcement Time out Explicitly degrade the path by re-sending interest with lower data rate. Source Gradient New Data Path

More information

Efficient Hybrid Multicast Routing Protocol for Ad-Hoc Wireless Networks

Efficient Hybrid Multicast Routing Protocol for Ad-Hoc Wireless Networks Efficient Hybrid Multicast Routing Protocol for Ad-Hoc Wireless Networks Jayanta Biswas and Mukti Barai and S. K. Nandy CAD Lab, Indian Institute of Science Bangalore, 56, India {jayanta@cadl, mbarai@cadl,

More information

A Novel Hierarchical Routing Protocol for Wireless Sensor Networks

A Novel Hierarchical Routing Protocol for Wireless Sensor Networks A Novel Hierarchical Routing Protocol for Wireless Sensor Networks TrongThuaHuynh 1 and Choong Seon Hong 2 Department of Computer Science, Kyung Hee University, 1 Seocheon, Giheung, Yongin, Gyeonggi 449-701

More information

Survey on Reliability Control Using CLR Method with Tour Planning Mechanism in WSN

Survey on Reliability Control Using CLR Method with Tour Planning Mechanism in WSN Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 4, Issue. 5, May 2015, pg.854

More information

CACHING IN WIRELESS SENSOR NETWORKS BASED ON GRIDS

CACHING IN WIRELESS SENSOR NETWORKS BASED ON GRIDS International Journal of Wireless Communications and Networking 3(1), 2011, pp. 7-13 CACHING IN WIRELESS SENSOR NETWORKS BASED ON GRIDS Sudhanshu Pant 1, Naveen Chauhan 2 and Brij Bihari Dubey 3 Department

More information

End-To-End Delay Optimization in Wireless Sensor Network (WSN)

End-To-End Delay Optimization in Wireless Sensor Network (WSN) Shweta K. Kanhere 1, Mahesh Goudar 2, Vijay M. Wadhai 3 1,2 Dept. of Electronics Engineering Maharashtra Academy of Engineering, Alandi (D), Pune, India 3 MITCOE Pune, India E-mail: shweta.kanhere@gmail.com,

More information

Location-aware In-Network Monitoring in Wireless Sensor Networks

Location-aware In-Network Monitoring in Wireless Sensor Networks Location-aware In-Network Monitoring in Wireless Sensor Networks Volker Turau and Christoph Weyer Department of Telematics, Technische Universität Hamburg-Harburg Schwarzenbergstraße 95, 21073 Hamburg,

More information

Scheduling of Multiple Applications in Wireless Sensor Networks Using Knowledge of Applications and Network

Scheduling of Multiple Applications in Wireless Sensor Networks Using Knowledge of Applications and Network International Journal of Information and Computer Science (IJICS) Volume 5, 2016 doi: 10.14355/ijics.2016.05.002 www.iji-cs.org Scheduling of Multiple Applications in Wireless Sensor Networks Using Knowledge

More information

IJREAT International Journal of Research in Engineering & Advanced Technology, Volume 1, Issue 2, April-May, 2013 ISSN:

IJREAT International Journal of Research in Engineering & Advanced Technology, Volume 1, Issue 2, April-May, 2013 ISSN: Fast Data Collection with Reduced Interference and Increased Life Time in Wireless Sensor Networks Jayachandran.J 1 and Ramalakshmi.R 2 1 M.Tech Network Engineering, Kalasalingam University, Krishnan koil.

More information

Lecture 8 Wireless Sensor Networks: Overview

Lecture 8 Wireless Sensor Networks: Overview Lecture 8 Wireless Sensor Networks: Overview Reading: Wireless Sensor Networks, in Ad Hoc Wireless Networks: Architectures and Protocols, Chapter 12, sections 12.1-12.2. I. Akyildiz, W. Su, Y. Sankarasubramaniam

More information

CS 204 Lecture Notes on Elementary Network Analysis

CS 204 Lecture Notes on Elementary Network Analysis CS 204 Lecture Notes on Elementary Network Analysis Mart Molle Department of Computer Science and Engineering University of California, Riverside CA 92521 mart@cs.ucr.edu October 18, 2006 1 First-Order

More information

Efficient On-Demand Routing for Mobile Ad-Hoc Wireless Access Networks

Efficient On-Demand Routing for Mobile Ad-Hoc Wireless Access Networks Efficient On-Demand Routing for Mobile Ad-Hoc Wireless Access Networks Joo-Han Song, Vincent Wong and Victor Leung Department of Electrical and Computer Engineering The University of British Columbia 56

More information

Broadcasting Techniques for Mobile Ad Hoc Networks

Broadcasting Techniques for Mobile Ad Hoc Networks Broadcasting Techniques for Mobile Ad Hoc Networks Broadcasting: It is the process in which one node sends a packet to all other nodes in the network. 1 Usefulness of broadcasting Broadcasting of net-wide

More information

TPSF+: A New Two-Phase Scatternet Formation Algorithm for Bluetooth Ad Hoc Networks

TPSF+: A New Two-Phase Scatternet Formation Algorithm for Bluetooth Ad Hoc Networks : A New Two-Phase Scatternet Formation Algorithm for Bluetooth Ad Hoc Networks Chu Zhang, Vincent W.S. Wong, and Victor C.M. Leung Department of Electrical and Computer Engineering The University of British

More information

Computation of Multiple Node Disjoint Paths

Computation of Multiple Node Disjoint Paths Chapter 5 Computation of Multiple Node Disjoint Paths 5.1 Introduction In recent years, on demand routing protocols have attained more attention in mobile Ad Hoc networks as compared to other routing schemes

More information

Target Tracking in Wireless Sensor Network

Target Tracking in Wireless Sensor Network International Journal of Information & Computation Technology. ISSN 0974-2239 Volume 4, Number 6 (2014), pp. 643-648 International Research Publications House http://www. irphouse.com Target Tracking in

More information

AN EFFICIENT MAC PROTOCOL FOR SUPPORTING QOS IN WIRELESS SENSOR NETWORKS

AN EFFICIENT MAC PROTOCOL FOR SUPPORTING QOS IN WIRELESS SENSOR NETWORKS AN EFFICIENT MAC PROTOCOL FOR SUPPORTING QOS IN WIRELESS SENSOR NETWORKS YINGHUI QIU School of Electrical and Electronic Engineering, North China Electric Power University, Beijing, 102206, China ABSTRACT

More information

Figure 1: Ad-Hoc routing protocols.

Figure 1: Ad-Hoc routing protocols. Performance Analysis of Routing Protocols for Wireless Ad-Hoc Networks Sukhchandan Lally and Ljiljana Trajković Simon Fraser University Vancouver, British Columbia Canada E-mail: {lally, ljilja}@sfu.ca

More information

Intra and Inter Cluster Synchronization Scheme for Cluster Based Sensor Network

Intra and Inter Cluster Synchronization Scheme for Cluster Based Sensor Network Intra and Inter Cluster Synchronization Scheme for Cluster Based Sensor Network V. Shunmuga Sundari 1, N. Mymoon Zuviria 2 1 Student, 2 Asisstant Professor, Computer Science and Engineering, National College

More information

Routing protocols in WSN

Routing protocols in WSN Routing protocols in WSN 1.1 WSN Routing Scheme Data collected by sensor nodes in a WSN is typically propagated toward a base station (gateway) that links the WSN with other networks where the data can

More information

Connected Point Coverage in Wireless Sensor Networks using Robust Spanning Trees

Connected Point Coverage in Wireless Sensor Networks using Robust Spanning Trees Connected Point Coverage in Wireless Sensor Networks using Robust Spanning Trees Pouya Ostovari Department of Computer and Information Siences Temple University Philadelphia, Pennsylvania, USA Email: ostovari@temple.edu

More information

Zonal Rumor Routing for. Wireless Sensor Networks

Zonal Rumor Routing for. Wireless Sensor Networks Tarun Banka Department of Electrical and Computer Engineering tarunb@engr.colostate.edu Zonal Rumor Routing for. Wireless Sensor Networks Gagan Tandon Department of Computer Science gagan@cs.colostate.edu

More information

Routing. Information Networks p.1/35

Routing. Information Networks p.1/35 Routing Routing is done by the network layer protocol to guide packets through the communication subnet to their destinations The time when routing decisions are made depends on whether we are using virtual

More information

Energy Efficient Data Gathering For Throughput Maximization with Multicast Protocol In Wireless Sensor Networks

Energy Efficient Data Gathering For Throughput Maximization with Multicast Protocol In Wireless Sensor Networks Energy Efficient Data Gathering For Throughput Maximization with Multicast Protocol In Wireless Sensor Networks S. Gokilarani 1, P. B. Pankajavalli 2 1 Research Scholar, Kongu Arts and Science College,

More information

Analysis of Cluster-Based Energy-Dynamic Routing Protocols in WSN

Analysis of Cluster-Based Energy-Dynamic Routing Protocols in WSN Analysis of Cluster-Based Energy-Dynamic Routing Protocols in WSN Mr. V. Narsing Rao 1, Dr.K.Bhargavi 2 1,2 Asst. Professor in CSE Dept., Sphoorthy Engineering College, Hyderabad Abstract- Wireless Sensor

More information

CONSTRUCTION AND EVALUATION OF MESHES BASED ON SHORTEST PATH TREE VS. STEINER TREE FOR MULTICAST ROUTING IN MOBILE AD HOC NETWORKS

CONSTRUCTION AND EVALUATION OF MESHES BASED ON SHORTEST PATH TREE VS. STEINER TREE FOR MULTICAST ROUTING IN MOBILE AD HOC NETWORKS CONSTRUCTION AND EVALUATION OF MESHES BASED ON SHORTEST PATH TREE VS. STEINER TREE FOR MULTICAST ROUTING IN MOBILE AD HOC NETWORKS 1 JAMES SIMS, 2 NATARAJAN MEGHANATHAN 1 Undergrad Student, Department

More information

Efficient On-Demand Routing for Mobile Ad-Hoc Wireless Access Networks

Efficient On-Demand Routing for Mobile Ad-Hoc Wireless Access Networks Efficient On-Demand Routing for Mobile Ad-Hoc Wireless Access Networks Joo-Han Song, Vincent W. S. Wong and Victor C. M. Leung Department of Electrical and Computer Engineering The University of British

More information

Token Ring VLANs and Related Protocols

Token Ring VLANs and Related Protocols CHAPTER 4 Token Ring VLANs and Related Protocols A VLAN is a logical group of LAN segments, independent of physical location, with a common set of requirements. For example, several end stations might

More information

A New Approach for Interference Aware Cost Effective Routing Algorithm in Wireless Sensor Network

A New Approach for Interference Aware Cost Effective Routing Algorithm in Wireless Sensor Network 2012 International Conference on Information and Network Technology (ICINT 2012) IPCSIT vol. 37 (2012) (2012) IACSIT Press, Singapore A New Approach for Interference Aware Cost Effective Routing Algorithm

More information

WSN Routing Protocols

WSN Routing Protocols WSN Routing Protocols 1 Routing Challenges and Design Issues in WSNs 2 Overview The design of routing protocols in WSNs is influenced by many challenging factors. These factors must be overcome before

More information

CFMTL: Clustering Wireless Sensor Network Using Fuzzy Logic and Mobile Sink In Three-Level

CFMTL: Clustering Wireless Sensor Network Using Fuzzy Logic and Mobile Sink In Three-Level CFMTL: Clustering Wireless Sensor Network Using Fuzzy Logic and Mobile Sink In Three-Level Ali Abdi Seyedkolaei 1 and Ali Zakerolhosseini 2 1 Department of Computer, Shahid Beheshti University, Tehran,

More information

An Adaptive Self-Organization Protocol for Wireless Sensor Networks

An Adaptive Self-Organization Protocol for Wireless Sensor Networks An Adaptive Self-Organization Protocol for Wireless Sensor Networks Kil-Woong Jang 1 and Byung-Soon Kim 2 1 Dept. of Mathematical and Information Science, Korea Maritime University 1 YeongDo-Gu Dongsam-Dong,

More information

On Performance Evaluation of Reliable Topology Control Algorithms in Mobile Ad Hoc Networks (Invited Paper)

On Performance Evaluation of Reliable Topology Control Algorithms in Mobile Ad Hoc Networks (Invited Paper) On Performance Evaluation of Reliable Topology Control Algorithms in Mobile Ad Hoc Networks (Invited Paper) Ngo Duc Thuan 1,, Hiroki Nishiyama 1, Nirwan Ansari 2,andNeiKato 1 1 Graduate School of Information

More information

Efficient Cluster Based Data Collection Using Mobile Data Collector for Wireless Sensor Network

Efficient Cluster Based Data Collection Using Mobile Data Collector for Wireless Sensor Network ISSN (e): 2250 3005 Volume, 06 Issue, 06 June 2016 International Journal of Computational Engineering Research (IJCER) Efficient Cluster Based Data Collection Using Mobile Data Collector for Wireless Sensor

More information

Using Mobile Relays to Prolong the Lifetime of Wireless Sensor Networks. Wang Wei Vikram Srinivasan Chua Kee-Chaing

Using Mobile Relays to Prolong the Lifetime of Wireless Sensor Networks. Wang Wei Vikram Srinivasan Chua Kee-Chaing Using Mobile Relays to Prolong the Lifetime of Wireless Sensor Networks Wang Wei Vikram Srinivasan Chua Kee-Chaing Overview The motivation of mobile relay The performance analysis for mobile relay in the

More information

A Neighbor Coverage Based Probabilistic Rebroadcast Reducing Routing Overhead in MANETs

A Neighbor Coverage Based Probabilistic Rebroadcast Reducing Routing Overhead in MANETs A Neighbor Coverage Based Probabilistic Rebroadcast Reducing Routing Overhead in MANETs Ankita G. Rathi #1, Mrs. J. H. Patil #2, Mr. S. A. Hashmi #3 # Computer Science-Information Technology Department,

More information

An Energy-Efficient Hierarchical Routing for Wireless Sensor Networks

An Energy-Efficient Hierarchical Routing for Wireless Sensor Networks Volume 2 Issue 9, 213, ISSN-2319-756 (Online) An Energy-Efficient Hierarchical Routing for Wireless Sensor Networks Nishi Sharma Rajasthan Technical University Kota, India Abstract: The popularity of Wireless

More information

Optimal Multi-sink Positioning and Energy-efficient Routing in Wireless Sensor Networks

Optimal Multi-sink Positioning and Energy-efficient Routing in Wireless Sensor Networks Optimal Multi-sink Positioning and Energy-efficient Routing in Wireless Sensor Networks Haeyong Kim, Yongho Seok, Nakjung Choi, Yanghee Choi, and Taekyoung Kwon School of Computer Science and Engineering

More information

Ameliorate Threshold Distributed Energy Efficient Clustering Algorithm for Heterogeneous Wireless Sensor Networks

Ameliorate Threshold Distributed Energy Efficient Clustering Algorithm for Heterogeneous Wireless Sensor Networks Vol. 5, No. 5, 214 Ameliorate Threshold Distributed Energy Efficient Clustering Algorithm for Heterogeneous Wireless Sensor Networks MOSTAFA BAGHOURI SAAD CHAKKOR ABDERRAHMANE HAJRAOUI Abstract Ameliorating

More information

Maximum Coverage Range based Sensor Node Selection Approach to Optimize in WSN

Maximum Coverage Range based Sensor Node Selection Approach to Optimize in WSN Maximum Coverage Range based Sensor Node Selection Approach to Optimize in WSN Rinku Sharma 1, Dr. Rakesh Joon 2 1 Post Graduate Scholar, 2 Assistant Professor, Department of Electronics and Communication

More information

Performance Evaluation of Mesh - Based Multicast Routing Protocols in MANET s

Performance Evaluation of Mesh - Based Multicast Routing Protocols in MANET s Performance Evaluation of Mesh - Based Multicast Routing Protocols in MANET s M. Nagaratna Assistant Professor Dept. of CSE JNTUH, Hyderabad, India V. Kamakshi Prasad Prof & Additional Cont. of. Examinations

More information

Using Hybrid Algorithm in Wireless Ad-Hoc Networks: Reducing the Number of Transmissions

Using Hybrid Algorithm in Wireless Ad-Hoc Networks: Reducing the Number of Transmissions Using Hybrid Algorithm in Wireless Ad-Hoc Networks: Reducing the Number of Transmissions R.Thamaraiselvan 1, S.Gopikrishnan 2, V.Pavithra Devi 3 PG Student, Computer Science & Engineering, Paavai College

More information

Novel Cluster Based Routing Protocol in Wireless Sensor Networks

Novel Cluster Based Routing Protocol in Wireless Sensor Networks ISSN (Online): 1694-0784 ISSN (Print): 1694-0814 32 Novel Cluster Based Routing Protocol in Wireless Sensor Networks Bager Zarei 1, Mohammad Zeynali 2 and Vahid Majid Nezhad 3 1 Department of Computer

More information

ScienceDirect. Analogy between immune system and sensor replacement using mobile robots on wireless sensor networks

ScienceDirect. Analogy between immune system and sensor replacement using mobile robots on wireless sensor networks Available online at www.sciencedirect.com ScienceDirect Procedia Computer Science 35 (2014 ) 1352 1359 18 th International Conference in Knowledge Based and Intelligent Information & Engineering Systems

More information

Mobile Sink to Track Multiple Targets in Wireless Visual Sensor Networks

Mobile Sink to Track Multiple Targets in Wireless Visual Sensor Networks Mobile Sink to Track Multiple Targets in Wireless Visual Sensor Networks William Shaw 1, Yifeng He 1, and Ivan Lee 1,2 1 Department of Electrical and Computer Engineering, Ryerson University, Toronto,

More information

Distributed Indexing and Data Dissemination in Large Scale Wireless Sensor Networks

Distributed Indexing and Data Dissemination in Large Scale Wireless Sensor Networks Distributed Indexing and Data Dissemination in Large Scale Wireless Sensor Networks Yiwei Wu Department of Computer Science Georgia State University Email: wyw@cs.gsu.edu Yingshu Li Department of Computer

More information

A Review: Optimization of Energy in Wireless Sensor Networks

A Review: Optimization of Energy in Wireless Sensor Networks A Review: Optimization of Energy in Wireless Sensor Networks Anjali 1, Navpreet Kaur 2 1 Department of Electronics & Communication, M.Tech Scholar, Lovely Professional University, Punjab, India 2Department

More information

Issues of Long-Hop and Short-Hop Routing in Mobile Ad Hoc Networks: A Comprehensive Study

Issues of Long-Hop and Short-Hop Routing in Mobile Ad Hoc Networks: A Comprehensive Study Issues of Long-Hop and Short-Hop Routing in Mobile Ad Hoc Networks: A Comprehensive Study M. Tarique, A. Hossain, R. Islam and C. Akram Hossain Dept. of Electrical and Electronic Engineering, American

More information

Energy Efficient Routing Using Sleep Scheduling and Clustering Approach for Wireless Sensor Network

Energy Efficient Routing Using Sleep Scheduling and Clustering Approach for Wireless Sensor Network Energy Efficient Routing Using Sleep Scheduling and Clustering Approach for Wireless Sensor Network G.Premalatha 1, T.K.P.Rajagopal 2 Computer Science and Engineering Department, Kathir College of Engineering

More information

CHAPTER 4 IMPACT OF ROUTING ATTACKS IN LOCATION BASED ROUTING PROTOCOL

CHAPTER 4 IMPACT OF ROUTING ATTACKS IN LOCATION BASED ROUTING PROTOCOL 63 CHAPTER 4 IMPACT OF ROUTING ATTACKS IN LOCATION BASED ROUTING PROTOCOL 4.1 INTRODUCTION This chapter explains the impact of the blackhole, rushing, sybil and wormhole active attacks, in the route discovery

More information

What is Multicasting? Multicasting Fundamentals. Unicast Transmission. Agenda. L70 - Multicasting Fundamentals. L70 - Multicasting Fundamentals

What is Multicasting? Multicasting Fundamentals. Unicast Transmission. Agenda. L70 - Multicasting Fundamentals. L70 - Multicasting Fundamentals What is Multicasting? Multicasting Fundamentals Unicast transmission transmitting a packet to one receiver point-to-point transmission used by most applications today Multicast transmission transmitting

More information

Implementation of Near Optimal Algorithm for Integrated Cellular and Ad-Hoc Multicast (ICAM)

Implementation of Near Optimal Algorithm for Integrated Cellular and Ad-Hoc Multicast (ICAM) CS230: DISTRIBUTED SYSTEMS Project Report on Implementation of Near Optimal Algorithm for Integrated Cellular and Ad-Hoc Multicast (ICAM) Prof. Nalini Venkatasubramanian Project Champion: Ngoc Do Vimal

More information

QoS Routing By Ad-Hoc on Demand Vector Routing Protocol for MANET

QoS Routing By Ad-Hoc on Demand Vector Routing Protocol for MANET 2011 International Conference on Information and Network Technology IPCSIT vol.4 (2011) (2011) IACSIT Press, Singapore QoS Routing By Ad-Hoc on Demand Vector Routing Protocol for MANET Ashwini V. Biradar

More information

Efficient Broadcast Algorithms To Reduce number of transmission Based on Probability Scheme

Efficient Broadcast Algorithms To Reduce number of transmission Based on Probability Scheme Efficient Broadcast s To Reduce number of transmission Based on Probability Scheme S.Tharani, R.Santhosh Abstract Two main approaches to broadcast packets in wireless ad hoc networks are static and dynamic.

More information

QoS-Aware Hierarchical Multicast Routing on Next Generation Internetworks

QoS-Aware Hierarchical Multicast Routing on Next Generation Internetworks QoS-Aware Hierarchical Multicast Routing on Next Generation Internetworks Satyabrata Pradhan, Yi Li, and Muthucumaru Maheswaran Advanced Networking Research Laboratory Department of Computer Science University

More information

Event Driven Routing Protocols For Wireless Sensor Networks

Event Driven Routing Protocols For Wireless Sensor Networks Event Driven Routing Protocols For Wireless Sensor Networks Sherif Moussa 1, Ghada Abdel Halim 2, Salah Abdel-Mageid 2 1 Faculty of Engineering, Canadian University Dubai, Dubai, UAE. 2 Faculty of Engineering,

More information

Power Efficient Data Gathering and Aggregation in Wireless Sensor Networks

Power Efficient Data Gathering and Aggregation in Wireless Sensor Networks Power Efficient Data Gathering and Aggregation in Wireless Sensor Networks Hüseyin Özgür Tan and İbrahim Körpeoǧlu Department of Computer Engineering, Bilkent University 68 Ankara, Turkey E-mail:{hozgur,korpe}@cs.bilkent.edu.tr

More information

VisualNet: General Purpose Visualization Tool for Wireless Sensor Networks

VisualNet: General Purpose Visualization Tool for Wireless Sensor Networks VisualNet: General Purpose Visualization Tool for Wireless Sensor Networks S. Rizvi and K. Ferens Department of Electrical and Computer Engineering University of Manitoba Winnipeg, Manitoba, Canada Ken.Ferens@ad.umanitoba.ca

More information

Broadcasting with Hard Deadlines in Wireless Multi-hop Networks Using Network Coding

Broadcasting with Hard Deadlines in Wireless Multi-hop Networks Using Network Coding WIRELESS COMMUNICATIONS AND MOBILE COMPUTING Wirel. Commun. Mob. Comput. 0000; 00: 6 Broadcasting with Hard Deadlines in Wireless Multi-hop Networks Using Network Coding Pouya Ostovari, Abdallah Khreishah,

More information

Monetary Cost and Energy Use Optimization in Divisible Load Processing

Monetary Cost and Energy Use Optimization in Divisible Load Processing 2004 Conference on Information Sciences and Systems, Princeton University, March 17 19, 2004 Monetary Cost and Energy Use Optimization in Divisible Load Processing Mequanint A. Moges, Leonardo A. Ramirez,

More information

AMRIS: A Multicast Protocol for Ad hoc Wireless Networks

AMRIS: A Multicast Protocol for Ad hoc Wireless Networks of AMRIS: A Multicast Protocol for Ad hoc Wireless Networks C.W. Wu, Y.C. Tay National University of Singapore wuchunwei@alum.comp.nus.edu.sg,tay@acm.org Abstract This paper introduces AMRIS, a new multicast

More information

Modified Low Energy Adaptive Clustering Hierarchy for Heterogeneous Wireless Sensor Network

Modified Low Energy Adaptive Clustering Hierarchy for Heterogeneous Wireless Sensor Network Modified Low Energy Adaptive Clustering Hierarchy for Heterogeneous Wireless Sensor Network C.Divya1, N.Krishnan2, A.Petchiammal3 Center for Information Technology and Engineering Manonmaniam Sundaranar

More information

SLALoM: A Scalable Location Management Scheme for Large Mobile Ad-hoc Networks

SLALoM: A Scalable Location Management Scheme for Large Mobile Ad-hoc Networks SLALoM A Scalable Location Management Scheme for Large Mobile Ad-hoc Networks Christine T. Cheng *, Howard L. Lemberg, Sumesh J. Philip, Eric van den Berg and Tao Zhang * Institute for Math & its Applications,

More information

AODV-PA: AODV with Path Accumulation

AODV-PA: AODV with Path Accumulation -PA: with Path Accumulation Sumit Gwalani Elizabeth M. Belding-Royer Department of Computer Science University of California, Santa Barbara fsumitg, ebeldingg@cs.ucsb.edu Charles E. Perkins Communications

More information

Dynamic Cooperative Routing (DCR) in Wireless Sensor Networks

Dynamic Cooperative Routing (DCR) in Wireless Sensor Networks Dynamic Cooperative Routing () in Wireless Sensor Networks Sivasankari H. 1, Leelavathi R. 1, Shaila K. 1, Venugopal K.R. 1, S.S. Iyengar 2, and L.M. Patnaik 3 1 Department of Computer Science and Engineering,

More information

Multipath Routing Algorithm for Wireless Sensor Networks

Multipath Routing Algorithm for Wireless Sensor Networks Multipath Routing Algorithm for Wireless Sensor Networks by Ye Ming Lu B. Eng., École Ploytechnique de Montréal, 1999 A THESIS SUBMITTED IN PARTIAL FULFILMENT OF THE REQUIREMENTS FOR THE DEGREE OF MASTER

More information

Energy-Aware Routing in Wireless Ad-hoc Networks

Energy-Aware Routing in Wireless Ad-hoc Networks Energy-Aware Routing in Wireless Ad-hoc Networks Panagiotis C. Kokkinos Christos A. Papageorgiou Emmanouel A. Varvarigos Abstract In this work we study energy efficient routing strategies for wireless

More information

Model and Algorithms for the Density, Coverage and Connectivity Control Problem in Flat WSNs

Model and Algorithms for the Density, Coverage and Connectivity Control Problem in Flat WSNs Model and Algorithms for the Density, Coverage and Connectivity Control Problem in Flat WSNs Flávio V. C. Martins, cruzeiro@dcc.ufmg.br Frederico P. Quintão, fred@dcc.ufmg.br Fabíola G. Nakamura fgnaka@dcc.ufmg.br,fabiola@dcc.ufam.edu.br

More information

Content. 1. Introduction. 2. The Ad-hoc On-Demand Distance Vector Algorithm. 3. Simulation and Results. 4. Future Work. 5.

Content. 1. Introduction. 2. The Ad-hoc On-Demand Distance Vector Algorithm. 3. Simulation and Results. 4. Future Work. 5. Rahem Abri Content 1. Introduction 2. The Ad-hoc On-Demand Distance Vector Algorithm Path Discovery Reverse Path Setup Forward Path Setup Route Table Management Path Management Local Connectivity Management

More information

Energy Aware Node Placement Algorithm for Wireless Sensor Network

Energy Aware Node Placement Algorithm for Wireless Sensor Network Advance in Electronic and Electric Engineering. ISSN 2231-1297, Volume 4, Number 6 (2014), pp. 541-548 Research India Publications http://www.ripublication.com/aeee.htm Energy Aware Node Placement Algorithm

More information

Optimized Paging Cache Mappings for efficient location management Hyun Jun Lee, Myoung Chul Jung, and Jai Yong Lee

Optimized Paging Cache Mappings for efficient location management Hyun Jun Lee, Myoung Chul Jung, and Jai Yong Lee Optimized Paging Cache Mappings for efficient location management Hyun Jun Lee, Myoung Chul Jung, and Jai Yong Lee Abstract Cellular IP maintains distributed cache for location management and routing purposes.

More information

3 No-Wait Job Shops with Variable Processing Times

3 No-Wait Job Shops with Variable Processing Times 3 No-Wait Job Shops with Variable Processing Times In this chapter we assume that, on top of the classical no-wait job shop setting, we are given a set of processing times for each operation. We may select

More information

FERMA: An Efficient Geocasting Protocol for Wireless Sensor Networks with Multiple Target Regions

FERMA: An Efficient Geocasting Protocol for Wireless Sensor Networks with Multiple Target Regions FERMA: An Efficient Geocasting Protocol for Wireless Sensor Networks with Multiple Target Regions Young-Mi Song, Sung-Hee Lee, and Young-Bae Ko College of Information and Communication, Ajou University,

More information

AN MMSE BASED WEIGHTED AGGREGATION SCHEME FOR EVENT DETECTION USING WIRELESS SENSOR NETWORK

AN MMSE BASED WEIGHTED AGGREGATION SCHEME FOR EVENT DETECTION USING WIRELESS SENSOR NETWORK AN MMSE BASED WEIGHTED AGGREGATION SCHEME FOR EVENT DETECTION USING WIRELESS SENSOR NETWORK Bhushan G Jagyasi, Bikash K Dey, S N Merchant, U B Desai SPANN Laboratory, Electrical Engineering Department,

More information

A FORWARDING CACHE VLAN PROTOCOL (FCVP) IN WIRELESS NETWORKS

A FORWARDING CACHE VLAN PROTOCOL (FCVP) IN WIRELESS NETWORKS A FORWARDING CACHE VLAN PROTOCOL (FCVP) IN WIRELESS NETWORKS Tzu-Chiang Chiang,, Ching-Hung Yeh, Yueh-Min Huang and Fenglien Lee Department of Engineering Science, National Cheng-Kung University, Taiwan,

More information

Maximizing the Lifetime of Clustered Wireless Sensor Network VIA Cooperative Communication

Maximizing the Lifetime of Clustered Wireless Sensor Network VIA Cooperative Communication Vol., Issue.3, May-June 0 pp--7 ISSN: - Maximizing the Lifetime of Clustered Wireless Sensor Network VIA Cooperative Communication J. Divakaran, S. ilango sambasivan Pg student, Sri Shakthi Institute of

More information

Effect Of Grouping Cluster Based on Overlapping FOV In Wireless Multimedia Sensor Network

Effect Of Grouping Cluster Based on Overlapping FOV In Wireless Multimedia Sensor Network Effect Of Grouping Cluster Based on Overlapping FOV In Wireless Multimedia Sensor Network Shikha Swaroop Department of Information Technology Dehradun Institute of Technology Dehradun, Uttarakhand. er.shikhaswaroop@gmail.com

More information